Analysis
-
max time kernel
142s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
01-01-2024 04:32
Static task
static1
Behavioral task
behavioral1
Sample
3be6b109be72f3e9bae6d5c5a46eaa43.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3be6b109be72f3e9bae6d5c5a46eaa43.exe
Resource
win10v2004-20231222-en
General
-
Target
3be6b109be72f3e9bae6d5c5a46eaa43.exe
-
Size
1.8MB
-
MD5
3be6b109be72f3e9bae6d5c5a46eaa43
-
SHA1
c2a7f36228861c661a18acb06ae0bbcf7263ae71
-
SHA256
d8d74701ba059feabce2c5b8e24eaa77ac95c27e266028e05f9b3f90092b5a1a
-
SHA512
83022df6a16c4f4b19b223fb80f1d1c1d3374535b04289679044bb286a3f187e1f4eebbf4c8ea3b17c442636450d9e56f0da208579b300b0a80717d91c1febbe
-
SSDEEP
49152:4yd4qWw2lrcW7iYsmBrYsDEOMql8q5lomNyi1aq:ZdJWHB8sEdqlf7h1X
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4788 3be6b109be72f3e9bae6d5c5a46eaa43.tmp -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1232 wrote to memory of 4788 1232 3be6b109be72f3e9bae6d5c5a46eaa43.exe 24 PID 1232 wrote to memory of 4788 1232 3be6b109be72f3e9bae6d5c5a46eaa43.exe 24 PID 1232 wrote to memory of 4788 1232 3be6b109be72f3e9bae6d5c5a46eaa43.exe 24
Processes
-
C:\Users\Admin\AppData\Local\Temp\3be6b109be72f3e9bae6d5c5a46eaa43.exe"C:\Users\Admin\AppData\Local\Temp\3be6b109be72f3e9bae6d5c5a46eaa43.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Users\Admin\AppData\Local\Temp\is-MH387.tmp\3be6b109be72f3e9bae6d5c5a46eaa43.tmp"C:\Users\Admin\AppData\Local\Temp\is-MH387.tmp\3be6b109be72f3e9bae6d5c5a46eaa43.tmp" /SL5="$D021C,1624557,58368,C:\Users\Admin\AppData\Local\Temp\3be6b109be72f3e9bae6d5c5a46eaa43.exe"2⤵
- Executes dropped EXE
PID:4788
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
250KB
MD5df886927716f7f706dc636c4e483cca8
SHA177215781eb54b299c4107dffca415221f9a9bbfb
SHA256be9ccb62399446631cba398c1547a976468239e1ce166e1d50749cd6a8945f3e
SHA512b2126f2a98ebc3ef8367c97e430e1a8a73cf1fdb87254c4fbe9f2207b9a335e518bfbc94e36937d8dcdd1e50dd6450302e45304e508bfcd4e7985d5f9359dfe9